Configuration options for an iBase system

There are various ways of configuring the iBase system. The differences between theses configurations are illustrated below.

There are two ways of holding security information:
  • In a security file (in Microsoft Access format).
  • In an SQL Server database, to which you connect at logon time by using a security connection file. The connection file contains only enough information to allow users access to the security database on the server.
Both files are .ids files and users see no difference in how they log on to them.
There are also two ways of holding the user and administrative data for the database:
  • In an Microsoft Access database file.
  • In an SQL Server database that is opened by using a connection file. The connection file contains only enough information to allow users access to the main database on the server.
Both the database and the database connection file are .idb files, and users see no difference in how they open them.
Note: The name for the database(s) on the server match, or partially match, the name chosen for the connection file, subject to naming conventions on the server.
This means that there are various ways of configuring the iBase system. The following sections illustrate the differences between these configurations.